{"id":4933,"date":"2014-03-07T08:00:45","date_gmt":"2014-03-07T16:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=4933"},"modified":"2021-03-21T09:36:56","modified_gmt":"2021-03-21T16:36:56","slug":"palo-alto-networks-news-week-march-7","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/03\/palo-alto-networks-news-week-march-7\/","title":{"rendered":"Palo Alto Networks News of the Week \u2013 March 7"},"content":{"rendered":"<p>Find anything you may have missed from the past week in today\u2019s <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/category\/news-of-the-week\/\" target=\"_blank\" rel=\"noopener\">Palo Alto Networks news<\/a> roundup!<\/p>\n<p>Palo Alto Networks executives Raj Shah &amp; Lee Klarich talked to CNBC about <a href=\"http:\/\/bit.ly\/1dgVG70\" target=\"_blank\" rel=\"noopener\">cyberthreats and M&amp;A<\/a> at the RSA Conference last week.<!--more--><\/p>\n<p>Separately, Lee Klarich &amp; Raj Shah also commented in CNBC's \"<a href=\"http:\/\/cnb.cx\/1q2wKFM\" target=\"_blank\" rel=\"noopener\">How cybersecurity pros feel about those on the other side<\/a>.\"<\/p>\n<p>Safeguarding your intellectual property doesn\u2019t have to be tricky. Isabelle Dumont <a href=\"http:\/\/bit.ly\/1c2r8Yl\" target=\"_blank\" rel=\"noopener\">explained how Palo Alto Networks can help<\/a>.<\/p>\n<p>Spotlight On Ignite 2014:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a href=\"http:\/\/bit.ly\/NRF4sQ\" target=\"_blank\" rel=\"noopener\">Check out the sessions<\/a> offered in the \"Modern Data Centers\" track.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1hQHxyl\" target=\"_blank\" rel=\"noopener\">Here are some of the sessions<\/a> we\u2019ll have available in the \u201cMobile and End-User Security\u201d track.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><center><div style=\"max-width:100%\" data-width=\"132\"><span class=\"ar-custom\" style=\"padding-bottom:113.64%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4937 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/ignite-logo-transparentV2.jpg\" alt=\"ignite-logo-transparentV2\" width=\"132\" height=\"150\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/ignite-logo-transparentV2.jpg 132w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/ignite-logo-transparentV2-35x40.jpg 35w\" sizes=\"auto, (max-width: 132px) 100vw, 132px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>If you're a registered Palo Alto Networks NextWave partner, log in to see our latest <a href=\"http:\/\/bit.ly\/1hHgTbT\" target=\"_blank\" rel=\"noopener\">Quarterly Channel Update<\/a> with Ron Myers, VP, Global Channels.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"483\"><span class=\"ar-custom\" style=\"padding-bottom:50.93%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4920 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg\" alt=\"NextWave logo-final\" width=\"483\" height=\"246\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final.jpeg 483w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-230x117.jpeg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/NextWave-logo-final-78x40.jpeg 78w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>Forrester\u2019s John Kindervag and Danelle Au of Palo Alto Networks elaborated <a href=\"http:\/\/bit.ly\/1kySVCE\" target=\"_blank\" rel=\"noopener\">on Zero Trust Architecture<\/a> &amp; how security practitioners should think about framework.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:64.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-4868 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/kindervag-au-500x323.jpg\" alt=\"kindervag-au\" width=\"500\" height=\"323\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/kindervag-au-500x323.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/kindervag-au-230x148.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/kindervag-au-463x300.jpg 463w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/kindervag-au-61x40.jpg 61w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/02\/kindervag-au.jpg 550w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>&nbsp;<\/p>\n<p>CIO Roundtable: IT leaders, including our own co-founder and CTO Nir Zuk, gathered in Sydney to discuss the future of security. To learn about what they had to say, <a href=\"http:\/\/bit.ly\/1lyZoh8\" target=\"_blank\" rel=\"noopener\">check out this article in CIO<\/a>.<\/p>\n<p><center><div style=\"max-width:100%\" data-width=\"445\"><span class=\"ar-custom\" style=\"padding-bottom:66.52%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-4934 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/coi_rt_paloalto-113_1.jpg\" alt=\"coi_rt_paloalto-113_1\" width=\"445\" height=\"296\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/coi_rt_paloalto-113_1.jpg 445w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/coi_rt_paloalto-113_1-230x152.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/03\/coi_rt_paloalto-113_1-60x40.jpg 60w\" sizes=\"auto, (max-width: 445px) 100vw, 445px\" \/><\/span><\/div><\/center>&nbsp;<\/p>\n<p>Sharat Sinha, VP at Palo Alto Networks, <a href=\"http:\/\/bbc.in\/1catcNV\" target=\"_blank\" rel=\"noopener\">weighed in<\/a> on Google's buy of sound authentication firm SlickLogin.<\/p>\n<p><a href=\"http:\/\/bit.ly\/1icyfQH\" target=\"_blank\" rel=\"noopener\">Check out this video interview<\/a> between security reporter Tom Field and Rick Howard, our Palo Alto Networks CSO, to hear about \"essential security education\" and the \u201cmust-reads\u201d in the Cybersecurity Canon, as well as his favorite hacker movies.<\/p>\n<p>Danelle Au <a href=\"http:\/\/bit.ly\/MIPgTT\" target=\"_blank\" rel=\"noopener\">discussed the steps<\/a> for safely enabling mobile devices in this Security Week article.<\/p>\n<p>Rick Howard talked APTs in this <a href=\"http:\/\/ubm.io\/1ouCa96\" target=\"_blank\" rel=\"noopener\">Dark Reading article<\/a>, \"Security Firms Face Crisis Of Trust.\"<\/p>\n<p>Rick Howard commented on recruiting security talent in this <a href=\"http:\/\/bit.ly\/1ie613M\" target=\"_blank\" rel=\"noopener\">The Information article<\/a> (subscription required).<\/p>\n<p>Students in Mt. Hood Community College\u2019s Cyber Security and Networking program have been <a href=\"http:\/\/bit.ly\/NGiOm1\" target=\"_blank\" rel=\"noopener\">accredited by Palo Alto Networks<\/a> for finishing a class on next generation firewalls \u2013 marking a first for the U.S.<\/p>\n<p>Webinar: Join Danelle Au, Director, Security Solutions, Palo Alto Networks and Sridhar Devarapalli, Director Product Management, Citrix as they discuss best practices to app and network security.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><a href=\"http:\/\/bit.ly\/1fLNjgl\" target=\"_blank\" rel=\"noopener\">Session one: 3\/19 at 2 pm CET<\/a>.<\/li>\n<li><a href=\"http:\/\/bit.ly\/1cdJTZ0\" target=\"_blank\" rel=\"noopener\">Session two: 3\/19 at 2pm ET<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Find anything you may have missed from the past week in today\u2019s Palo Alto Networks news roundup! Palo Alto Networks executives Raj Shah &amp; Lee Klarich talked to CNBC about cyberthreats and &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[203],"tags":[358,349,217,355,97,73],"coauthors":[709],"class_list":["post-4933","post","type-post","status-publish","format-standard","hentry","category-news-of-the-week","tag-cio","tag-cnbc","tag-ignite-2014","tag-nextwave","tag-webinar","tag-zero-trust"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4933"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4933\/revisions"}],"predecessor-version":[{"id":128736,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4933\/revisions\/128736"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4933"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=4933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}